Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 58 of 132
CVE-2025-40324UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40324 CVE-2025-40324: linux - In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix c...
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix crash in nfsd4_read_release() When tracing is enabled, the trace_nfsd_read_done trace point crashes during the pynfs read.testNoFh test.
Scope: local
bookworm: resolved (fixed in 6.1.159-1)
bullseye: resolved (fixed in 5.10.247-1)
forky: resolved (fixed in 6.17.8-1)
sid: resolved (fixed in 6.17.8-1
debian
CVE-2025-39985UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39985 CVE-2025-39985: linux - In the Linux kernel, the following vulnerability has been resolved: can: mcba_u...
In the Linux kernel, the following vulnerability has been resolved: can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow Sending an PF_PACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN driver. The only check which is performed by the PF_PACKET framework is to make sure that skb->len fits the interface's MTU. Unf
debian
CVE-2025-40294UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40294 CVE-2025-40294: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set
debian
CVE-2025-40060UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40060 CVE-2025-40060: linux - In the Linux kernel, the following vulnerability has been resolved: coresight: ...
In the Linux kernel, the following vulnerability has been resolved: coresight: trbe: Return NULL pointer for allocation failures When the TRBE driver fails to allocate a buffer, it currently returns the error code "-ENOMEM". However, the caller etm_setup_aux() only checks for a NULL pointer, so it misses the error. As a result, the driver continues and eventually causes a ke
debian
CVE-2025-68200UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68200 CVE-2025-68200: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Add bp...
In the Linux kernel, the following vulnerability has been resolved: bpf: Add bpf_prog_run_data_pointers() syzbot found that cls_bpf_classify() is able to change tc_skb_cb(skb)->drop_reason triggering a warning in sk_skb_reason_drop(). WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline] WARNING: CPU: 0 PID: 5965 at net/core
debian
CVE-2025-68773UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68773 CVE-2025-68773: linux - In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cp...
In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cpm: Check length parity before switching to 16 bit mode Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers with even size") failed to make sure that the size is really even before switching to 16 bit mode. Until recently the problem went unnoticed because kernfs uses a pre-allo
debian
CVE-2025-68220UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68220 CVE-2025-68220: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethern...
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error Make knav_dma_open_channel consistently return NULL on error instead of ERR_PTR. Currently the header include/linux/soc/ti/knav_dma.h returns NULL when the driver is disabled, but the driver implementation does not even retur
debian
CVE-2025-39994UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39994 CVE-2025-39994: linux - In the Linux kernel, the following vulnerability has been resolved: media: tune...
In the Linux kernel, the following vulnerability has been resolved: media: tuner: xc5000: Fix use-after-free in xc5000_release The original code uses cancel_delayed_work() in xc5000_release(), which does not guarantee that the delayed work item timer_sleep has fully completed if it was already running. This leads to use-after-free scenarios where xc5000_release() may free th
debian
CVE-2025-39978UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39978 CVE-2025-39978: linux - In the Linux kernel, the following vulnerability has been resolved: octeontx2-p...
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing
debian
CVE-2025-68765UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68765 CVE-2025-68765: linux - In the Linux kernel, the following vulnerability has been resolved: mt76: mt761...
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() In mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the subsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function returns an error without freeing sskb, leading to a memory leak. Fix this by calling dev_kfree_skb() on sskb in the
debian
CVE-2025-68742UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68742 CVE-2025-68742: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix in...
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix invalid prog->stats access when update_effective_progs fails Syzkaller triggers an invalid memory access issue following fault injection in update_effective_progs. The issue can be described as follows: __cgroup_bpf_detach update_effective_progs compute_effective_progs bpf_prog_array_alloc items[ind
debian
CVE-2025-40030UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40030 CVE-2025-40030: linux - In the Linux kernel, the following vulnerability has been resolved: pinctrl: ch...
In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return value of pinmux_ops::get_function_name() While the API contract in docs doesn't specify it explicitly, the generic implementation of the get_function_name() callback from struct pinmux_ops - pinmux_generic_get_function_name() - can fail and return NULL. This is already checked in pi
debian
CVE-2025-71224UNKNOWNfixed in linux 6.1.164-1 (bookworm)2025
CVE-2025-71224 CVE-2025-71224: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB. RX may run before JOIN_OCB is executed, in which case the OCB interface is not operational. Skip RX peer handling when the interface is not joined
debian
CVE-2025-68820UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68820 CVE-2025-68820: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: xattr...
In the Linux kernel, the following vulnerability has been resolved: ext4: xattr: fix null pointer deref in ext4_raw_inode() If ext4_get_inode_loc() fails (e.g. if it returns -EFSCORRUPTED), iloc.bh will remain set to NULL. Since ext4_xattr_inode_dec_ref_all() lacks error checking, this will lead to a null pointer dereference in ext4_raw_inode(), called right after ext4_get_i
debian
CVE-2025-68367UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68367 CVE-2025-68367: linux - In the Linux kernel, the following vulnerability has been resolved: macintosh/m...
In the Linux kernel, the following vulnerability has been resolved: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse The following warning appears when running syzkaller, and this issue also exists in the mainline code. ------------[ cut here ]------------ list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100. WARNING: CPU: 0
debian
CVE-2025-68778UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68778 CVE-2025-68778: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: don'...
In the Linux kernel, the following vulnerability has been resolved: btrfs: don't log conflicting inode if it's a dir moved in the current transaction We can't log a conflicting inode if it's a directory and it was moved from one parent directory to another parent directory in the current transaction, as this can result an attempt to have a directory with two hard links durin
debian
CVE-2025-40029UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40029 CVE-2025-40029: linux - In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc...
In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: Check return value of platform_get_resource() platform_get_resource() returns NULL in case of failure, so check its return value and propagate the error in order to prevent NULL pointer dereference.
Scope: local
bookworm: resolved (fixed in 6.1.158-1)
bullseye: resolved (fixed in 5.10.247-1)
for
debian
CVE-2025-68801UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68801 CVE-2025-68801: linux - In the Linux kernel, the following vulnerability has been resolved: mlxsw: spec...
In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_router: Fix neighbour use-after-free We sometimes observe use-after-free when dereferencing a neighbour [1]. The problem seems to be that the driver stores a pointer to the neighbour, but without holding a reference on it. A reference is only taken when the neighbour is used by a nexthop. Fix
debian
CVE-2025-40105UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40105 CVE-2025-40105: linux - In the Linux kernel, the following vulnerability has been resolved: vfs: Don't ...
In the Linux kernel, the following vulnerability has been resolved: vfs: Don't leak disconnected dentries on umount When user calls open_by_handle_at() on some inode that is not cached, we will create disconnected dentry for it. If such dentry is a directory, exportfs_decode_fh_raw() will then try to connect this dentry to the dentry tree through reconnect_path(). It may hap
debian
CVE-2025-68339UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68339 CVE-2025-68339: linux - In the Linux kernel, the following vulnerability has been resolved: atm/fore200...
In the Linux kernel, the following vulnerability has been resolved: atm/fore200e: Fix possible data race in fore200e_open() Protect access to fore200e->available_cell_rate with rate_mtx lock in the error handling path of fore200e_open() to prevent a data race. The field fore200e->available_cell_rate is a shared resource used to track available bandwidth. It is concurrently a
debian